Lessons from MAS Lapses: A Practical Guide to Establishing a Source of Wealth and Source of Funds

blog lesson from mas lapses

In July 2025, the Monetary Authority of Singapore (MAS) sent a shockwave through the financial sector by taking enforcement action against six banks. The charge? Significant AML compliance breaches, specifically regarding lapses in verifying Source of Wealth (SOW).

“Several institutions failed to follow up on discrepancies in client information, which should have raised doubts about where the money came from,” MAS noted in their report.

This case proves that “having a policy” is no longer a defense. Regulators now demand a dynamic, risk-based approach that spans the entire client lifecycle—not just the onboarding phase. This guide provides a defensible framework for establishing SOW and Source of Funds (SOF) to protect your organization from reputational and operational fallout.

Understanding the Core Difference

Before diving into the process, it is critical to distinguish between the two pillars of verification:

  • Source of Wealth (SOW): The origin of the subject’s entire body of wealth (e.g., 20 years of inheritance, investments, and business ownership).
  • Source of Funds (SOF): The origin of the specific money used for a particular transaction (e.g., a specific bank transfer or sale of shares).

 

When to Trigger SOW/SOF Due Diligence

In the APAC region, verification is not a “one-and-done” task. It must be triggered when risk exposure shifts.

Risk Trigger

Why SOW/SOF Verification is Mandatory

Credit Risk

To ensure the client has the genuine financial capacity to meet obligations without relying on undisclosed or illicit “off-book” funds.

Liquidity Risk

Sudden asset liquidation (e.g., property or business sales) may indicate financial stress or an attempt to “clean” capital.

Operational Risk

Weak internal controls lead to reliance on falsified data. Structured SOW checks act as a final firewall against fraud.

 

The 4-Step Framework for Defensible Verification

  1. Identify Undisclosed Financial Risks

Stop treating client declarations as facts. Use risk intelligence and transaction monitoring to identify gaps between reported income and actual behavior.

Watch for:

  • Unexplained deposits or circular transaction patterns.
  • Frequent related-party transfers without clear commercial logic.
  • Assets that are inconsistent with the client’s declared risk profile.

 

2. Validate Economic Legitimacy

Trace all income back to a verifiable, lawful economic activity. In APAC, this requires a deep dive into:

  • Business Operations: Confirming the company actually exists and generates the profit claimed.
  • Real Estate: Verifying historical titles and sale prices.
  • Inheritance/Gifts: Moving beyond “family money” to find the original source of that wealth.
  • Note: Exercise extreme caution with high-risk jurisdictions, shell companies, or crypto-linked wealth lacking a clear audit trail.

 

3. Assess Lifestyle–Wealth Proportionality

Does the “on-paper” wealth match the “on-the-ground” reality? High-impact due diligence includes assessing:

  • Global property footprints and luxury asset ownership.
  • Frequency of high-value travel and philanthropic activity.
  • The Red Flag: A massive gap between reported income and a lavish lifestyle suggests unreported income or illicit wealth accumulation.

 

4. Authenticate and Corroborate

The MAS enforcement action specifically cited “failure to follow up on discrepancies.” To avoid this, move beyond client-provided PDFs:

  • Cross-Reference: Check bank statements against tax filings and shareholding disclosures.
  • Verify the Issuer: Ensure that employment contracts or dividend records come from verifiable, legitimate entities.
  • Use OSINT: Utilize open-source intelligence and regional document validation tools to ensure documents haven’t been tampered with or issued by “shell” authorities.

 

The Bottom Line: Assumptions are Liabilities

Many firms in Asia still rely on “surface checks” or uncorroborated client statements. This creates blind spots for Politically Exposed Persons (PEPs), undeclared beneficial ownership, and circular financing schemes.

With rising regulatory pressure, a “good faith” effort is no longer enough. You need a documented, defensible, and audited trail of diligence.

Other Articles

How to Align Investigative Findings with Evidentiary Standards in Court

Presenting evidence in a court of law is no way the same as presenting evidence for clients on corporate due diligence. Internal due diligence may tolerate ambiguity or provisional conclusions, but courtroom evidence must withstand legal admissibility standards, cross‑examination, and judicial scrutiny.

How to Evaluate the Credibility of Online Information in Corporate Intelligence

In the digital age, the first clue in corporate intelligence often comes from online sources—a sensational blogpost, a Wikipedia entry, a social media post, or even an AI-generated report that can be misleading. Even lawyers have been found wanting, citing unverified sources in court due to AI tools.